Managed XDR
Group-IB MDP Report
File info
Filename: 0aaacd11d8b956d317489d060e72946d28ab6aef9be1b541aff9904a750f4b51.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 515.5 KB
Env info
win7/x86 en
Hashes
SHA1: ca3db1d10a092fb7b82acd344ec9b25dfcb58e6e
SHA256: 45eb2938a03741a1f75b9f193180c4d398b9ecec8e807d061174dc438c9d0f53
MD5: 336ea498bb074c39bd64c3ed12105a69
Signatures
Execution
T1047 has_wmi: Executes one or several WMI requests
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1027.002 pe_features: Executable file has PE anomalies (may be false positive)
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1057 process_interest: Enumerates processes
T1518 locates_browser: Attempts to identify where browsers are installed
Impact
T1486 modifies_files2: Cryptolocker indicators detected (100 or more files are modified)
T1486 modifies_files: Cryptolocker indicators detected (renamed 100 or more files)
T1490 vssadmin_delete_shadows: Attempt to delete volume shadow copies
T1486 ransomware_message: Ransomware indicators detected (possible ransom message creation)
Other
yara_rules: Static rules
ransomware_shadowcopy: Removes volume shadow copies
no_graphical_activity: No graphic activity
creates_in_programdata: Creates files in the ProgramData directory
test_check_service: Starts services
writes_data: Writes big amount of data to disk
Managed XDR